Release notes - IBM Security Verify Governance Adapter for IBM Security Verify Privilege Vault 10.0.3

IBM Security Verify Governance Manager adapter for IBM Security Verify Privilege Vault Server 10.0.3 is available. Compatibility, installation, and other getting-started issues are addressed.

Copyright International Business Machines Corporation 2003, 2025. All rights reserved.
US Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.


Contents

·       Preface

·       Adapter Features and Purpose

·       License Agreement

·       Contents of this Release

·       Installation and Configuration Notes

·       Customizing or Extending Adapter Features

·       Supported Configurations

·       Notices


Preface

Welcome to the IBM Security Verify Governance Adapter for IBM Security Verify Privilege Vault

These Release Notes contain information for the following products that was not available when the IBM Security Verify Governance Server manuals were printed:

·       IBM Security Verify Governance adapter for IBM Security Verify Privilege Vault (IBM Security Secret Server and for Thycotic Secret Server) Installation and Configuration Guide


Adapter Features and Purpose

The SDI-based IBM Security Verify Governance Adapter for IBM Security Verify Privilege Vault Server is designed to reconcile users, groups, folders and secrets and manage user entitlements on IBM Security Verify Privilege Vault Server. It also supports user management tasks such as account add, modify, suspend, restore and password change.

The adapter runs in "agentless" mode and communicates using HTTPS protocol.

The IBM Verify Governance Adapters are powerful tools that require Administrator Level authority. Adapters operate much like a human system administrator, managing users, groups and permissions. Operations requested from the IBM Security Verify Governance server will fail if the adapter is not given sufficient authority to perform the requested task. IBM recommends that this adapter run with administrative permissions.


License Agreement

Review and agree to the terms of the IBM Security Verify Governance Adapter License prior to using this product.

The license can be viewed from the "license" folder included in the product package.


Contents of this Release

Adapter Version

Component

Version

Release Date

2025 June 11 01.41.03

Adapter Version

10.0.3

Component Versions

Adapter build: 10.0.3.3

Profile:  10.0.3.3

Connector:  10.0.3.3

Dispatcher 7.1.39 or higher (packaged separately)

Documentation

The following guides are available in the IBM Knowledge Center

IBM Security Verify Governance adapter for IBM Security Verify Privilege Vault Installation and Configuration Guide

New Features

Internal#

Enhancement # (RFE)

Description

 

Items included in current release (10.0.3)

None

 

Items included in release (10.0.2)

 

SVGAD-3402

ADAPT-151

ISVG adapter upgrade to support SDI 10: Privilege Vault/Thycotic

 

Items included in release (10.0.1)

SVGAD-647 (Internal)

IBM Security Verify Privilege Vault (Thycotic) adapter now supports SDI 7.2 + FP0011

Internal

 

Rebranding to IBM Security Verify Governance and IBM Security Verify Privilege Vault

 

 Items included in release (7.1.5)

 

 

 None

Internal RTC 184803

 

 Items included in release (7.1.4)

 

 

 Add bundledefinition.json file in adapter package to install adapter inside VA

 

 

 Items included in release (7.1.3)

 

 Internal RTC 182697

 

 As a Thycotic Adapter developer, I must ensure that the adapter works on ISIM

 

 

 Items included in release (7.1.2)

 

 None

 

 

 Items included in release (7.1.1)

 

RTC 179021

 

 Implement nested parent folder hierarchy on IGI for Thycotic Adapter

 

 

 Items included in release (7.1.0)

 

 Initial release

 

Closed Issues

Internal#

Case/Known Issue#

Case # / Description

Items closed in current release (10.0.3)

SVGAD-2834 / Bug 4339

TS015692327 / DT426649

Changes made to ensure we don't always return "Error: authenticating: Ensure username/password of the secret server URL are correct." in the event of any error while trying to collect the details of a secret, the folderId and the folderPath. We actually get the folderId even if not specified on the secret level

Items closed in release (10.0.2)

SVGAD-2868 / Bug 4391

TS016641274

Error: Error authenticating. Ensure username / password or secret server URL are correct. Only after a connection test does the adapter work. It doesn’t refresh the token.

Items closed in release (10.0.1)

RTC 190852

TS008269108

How can customer restore ThycoticAdapterAccount after isim suspend account in IBM Security Verify Privilege Vault?

 

 

Items closed in release (7.1.5)

RTC 185246

Bugs 3077

 IJ20704

Bundledefinition.json for Thycotic adapter must copy the http jars in SDI patches folder

 

 

Items closed in release (7.1.4)

 Internal RTC 184267

 

 Use encrypted attribute for Client Secret on service form

 

 

Items closed in release (7.1.3)

 

 

None

 

 

Items closed in release (7.1.2)

 RTC 180356

Internal Bugs 2744

 

For Thycotic Adapter, I must ensure that all inactive and restricted secrets are reconciled properly, and recon completes properly

 RTC 178365

Internal Bugs 2685

 

 As a Thycotic adapter developer, I must ensure that the operation fails when the adapter password has expired

 

 

Items closed in release (7.1.1)

 RTC 178447

 

Duplicate names of the entities are represented improperly on IGI under Application Access tab

 

 

Items closed in release (7.1.0)

 

 

 

Initial release.

 

 

Known Limitations

Internal#

APAR#

Case # / Description

RTC 183629

N/A

 group membership changes not being audited when executed via API. This is Thycotic secret server issue which is resolved in v10.6.000026

 

RTC 183629

N/A

 AD groups (non-local groups with domain id other than -1)  which are imported in Secret Server - management tasks are failing, it is not currently supported by Adapter.

 

N/A

N/A

Delete operation is not supported by Thycotic Secret Server and IBM Security Secret Server resource therefore IBM Security Identity Governance and Intelligence adapter for IBM Security Secret Server and Thycotic Secret Server also does not support Delete operation.

N/A

N/A

IBM Security Identity adapter for IBM Security Secret Server and Thycotic Secret Server supports only reconciliation and create account feature for Application Accounts.

N/A

N/A

While adding secret and folders to Users/Groups, by default "view" secret-permission/folder-permission is given.

N/A

N/A

If duplicate secret is created with same template name and within same folder (secret path is also same), then such secrets are shown improperly on IGI under Application Access Tab after reconciliation.

N/A

N/A

Thycotic Secret Server / IBM Security Secret Server resource version number is not displayed under status and information tab

N/A

N/A

If Inherit Permissions from Parent option for any child folder is enabled on Thycotic Secret Server and IBM Security Secret Server resource, then adapter can not add/remove such child folders to/from Users. Only Parent folders can be managed from ISIM/IGI in that case.

 

Installation and Configuration Notes

             See the IBM Security Verify Governance Application Adapters for SCIM Adapter Installation and Configuration guide.

Corrections and/or additions to the Installation and Configuration sections of the  adapter guide

 

Chapter 1: Overview

             No updates for the current release

 

Chapter 2: Planning

             Prerequisites:

               Directory Integrator:

                          Remove 7.2 + FP6 + 7.2.0-ISS-SDI-LA0019 from the description

                          Identity server:

                          Update description as below:

                                       The following servers are supported:

                                       - IBM Security Verify Governance Identity Manager

                                       - IBM Security Verify Governance

 

Chapter 3: Installing

 

-> Installing ILMT-Tags File

          (Please add new section "Installing ILMT-Tags"  File under the section Installing > Installing ILMT-Tags in install guide.)

          Before you begin:

 

          - The Dispatcher must be installed

 

          Procedure:

             Copy the files in the ILMT-Tags folder to the specified location:

 

              1. Windows: <SDI-HOME>/swidtag

              2. Unix/Linux: <SDI-HOME>/swidtag

 

 

 

Installing in Virtual Appliance (Chapter present under ISVG only)

For Verify Governance target management, you can install an IBM Security Verify Governance Adapters or a custom adapter on the built-in Security Directory Integrator in the virtual appliance instead of installing the adapter externally. As such, there is no need to manage a separate virtual machine or system.

About this task

This procedure is applicable to install this adapter on the virtual appliance.

Procedure

1.     Download the adapter package from the IBM Passport Advantage.
For example, Adapter-<Adaptername>.zip.
The adapter package includes the following files:

Table 1. Adapter package contents

Files

Descriptions

bundledefinition.json

The adapter definition file. It specifies the content of the package, and the adapter installation and configuration properties that are required to install and update the adapter.

Adapter JAR profile

A Security Directory Integrator adapter always include a JAR profile which contains:

·       targetProfile.json

o   Service provider configuration

o   Resource type configuration

o   List of assembly lines

·       A set of assembly lines in XML files

·       A set of forms in XML files

·       Custom properties that include labels and messages for supported languages.

 

Use the Target Administration module to import the target profile.

Additional adapter specific files

Examples of adapter specific files:

·       Connector jar files

·       Configuration files

·       Script files

·       Properties files

 

The file names are specified in the adapter definition file along with the destination directory in the virtual appliance.

 

 

 

2.     From the top-level menu of the Appliance Dashboard, click Configure > SDI Management.

3.     Select the instance of the Security Directory Integrator for which you want to manage the adapters and click Manage > SDI Adapters
The SDI Adapters window is displayed with a table that list the name, version, and any comments about the installed adapters.

4.     On the SDI Adapters window, click Install.

5.     On the File Upload window, click Browse to locate the adapter package and then click OK.
For example, Adapter-<Adaptername>.zip.

6.     Provide the missing 3rd party libraries when prompted.

a.      On the File Upload for Pre-requisite files window, click Select Files.
         A new File Upload window is displayed.

b.     Browse and select all the missing libraries and files. For example, httpclient-4.0.1.jar

c.      Click Open.
        The selected files are listed in the File Upload for Pre-requisite files window.

d.     Click OK.
                    The missing files are uploaded and the adapter package is updated with the 3rd party libraries.

 

7.     Enable secure communication.

a.      Select the instance of the Security Directory Integrator for which you want to manage the adapter.

b.     Click Edit.

c.      Click the Enable SSL check box.

d.     Click Save Configuration.

 

8.     Import the SSL certificate to the IBM® Security Directory Integrator server.

a.      Select the instance of the Security Directory Integrator for which you want to manage the adapter.

b.     Click Manage > Certificates.

c.      Click the Signer tab.

d.     Click Import.
     The Import Certificate window is displayed.

e.      Browse for the certificate file.

f.       Specify a label for the certificate. It can be any name.

g.     Click Save.

 

Note: While uploading the Adapter package, you may receive System Error: A file included in the SDI Adapter zip already exists on the system and the Server Message log under Appliance tab of VA will have a reference to error com.ibm.identity.sdi.SDIManagementService  File ibm.com_IBM_Verify_Identity_Governance_xxxx.swidtag found in the adapter zip at location ILMT-Tags/ already exists in system. This is because, you can install the same swidtags only once. So, if another adapter of the same type is installed, remove the swidtags.

The ibm.com_IBM_Verify_Identity_Governance_Enterprise-xxxx.swidtag file is common to all adapters. In addition to the common swidtag file, an application adapter needs ibm.com_IBM_Verify_Identity_Governance_Application_Adapters-xxxx.swidtag file and an infra adapter needs ibm.com_IBM_Verify_Identity_Governance_Lifecycle-xxxx.swidtag and ibm.com_IBM_Verify_Identity_Governance_Compliance-xxxx.swidtag files. So, if an application adapter is already installed and this is an infra adapter, then only install the infra-specific swidtags and the other way around. Please visit Security Verify Governance Adapters v10.x link to identify the adapter type of the installed adapters.

 

 

                      Installing in an IBM Security Verify Directory Dispatcher Container

 

Before you begin

The steps to install adapter and related files into the container can be performed using the adapterUtil.sh script, which is shipped with the dispatcher package. This script should be staged on the machine running Kubernetes cli. The adapterUtil.sh script is also readily available in the bin directory of ISIM IBM Security Verify Governance Identity Manager Container Starter Kit installation directory (If ISVDI was selected for installation during the ISIM container installation steps).

If, for any reason, the adapter util script cannot be executed or used, the below manual instructions must be followed to copy the files to the persistent volume.

Note:  The container must be restarted after installing or uninstalling the adapter and any changes to the configuration yaml. To activate changes and restart the container run the following commands:

.       <path_to_starterkit>/bin/createConfigs.sh isvdi

.       For OpenShift container:   oc -n isvgim rollout restart deployment isvdi

.       For kubernetes container: kubectl -n isvgim rollout restart deployment isvdi

           

 

Note: This document only describes the adapterUtil.sh command options that are required to install this adapter. For other command options, such as listing installed connectors and 3rd party jars, please refer to the Dispatcher10 Installation and Configuration Guide.

 

Installing / Upgrading / Re-installing / Downgrading the adapter

 

Using Script

Use the below command to install / upgrade/ re-install / downgrade the adapter:

/path/to/adapterUtil.sh -loadAdapter "/path/to/Adapter-Thycotic-*.zip" accept

Where /path/to/adapterUtil.sh is the location where the adapterUtil.sh script is installed and /path/to/Adapter-Thycotic*.zip is the location where the Adapter zip file is staged on the machine running Kubernetes cli.

 

Manually copying files to Persistent Volume

Copy the files to the persistent volume mapped to the /opt/IBM/svgadapters directory of the container image as per the given directory structure:

ThycoticConnector.jar.jar

Copy this file to the <Persistent_Volume>/jars/connectors directory.

 

ILMT-Tags

Copy below files to the <Persistent_Volume>/swidtag directory:

 

ibm.com_IBM_Verify_Identity_Governance_Application_Adapters-11.0.0

ibm.com_IBM_Verify_Identity_Governance_Enterprise-11.0.0 

 

 

Copying 3rd party libraries:

Using Script

Use the below command to copy the 3rd party jars:

/path/to/adapterUtil.sh -copyToPatches "/path/to/<jarfile>.jar"

 

E.g. If you want to copy httpclient-10.0.14.jar then use below command, likely copy all other required external jars. List of all required jars with version mentioned in the Supported Configuration > Supported third-part client libraries. Refer to Installing >  Installing third-party client libraries for more details.

 

/path/to/adapterUtil.sh -copyToPatches "/path/to/httpclient-*.jar"

 

This command will copy the 3rd party jars to the <Persistent_Volume>/jars/patches directory.

 

Manually copying files to the Persistent Volume 

            

Copy required 3rd party jar files to the <Persistent_Volume>/jars/patches directory (List of all required jars with version mentioned in the Supported Configuration > Supported third-part client libraries. Refer to Installing >  Installing third-party client libraries for more details.):

 

 

Configuring the SSL connection between the IBM Security Verify Directory Integrator Container and the Thycotic  Apps Target

 

Refer https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#keyfile_trusted-certificates page from SVDI

 

If the config.yaml file which is used as the YAML_CONFIG_FILE environment variable for the container doesn't have a trusted-certificates element, follow the instructions that are provided in https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#keyfile_trusted-certificates to add a trusted-certificates section to the config.yaml file.

 

 

 

To add a trusted-certificates element (if it doesn’t exist in current configuration) to the config.yaml file which is used as parameter for YAML_CONFIG_FILE environment variable of the container, download the DigiCert Global Root CA and DigiCert Global Root G2 certificates in DER/CRT format from https://www.digicert.com/kb/digicert-root-certificates.htm and place the certificate in the certs directory of the config volume which contains the config.yaml file. The default location for this config volume is /opt/IBM/dispatcher/config.

 

Provide this path of the certificate in config.yaml file as shown in the example below:

 

keyfile:

  trusted-certificates:

- '@/opt/IBM/dispatcher/config/certs/DigiCertGlobalRootG2.crt'

- '@/opt/IBM/dispatcher/config/certs/DigiCertGlobalRootCA.crt'

 

 

Enabling TLS 1.2

 

Refer https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#advanced page from SVDI to add an advanced configuration element (if it don't exist in current configuration) to the config.yaml file which is used as parameter for YAML_CONFIG_FILE environment variable of the container.

 

If the config.yaml file which is used as the YAML_CONFIG_FILE environment variable for the container doesn't have an advanced configuration element, follow the instructions that are provided in https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#advanced to add an advanced configuration section to the config.yaml file.

 

To enable TLSv1.2, add 2 attr and value key pair (as mentioned in the SVDI guide) as below:

 

- attr: com.ibm.di.SSLProtocols

                          value: 'TLSv1.2'

- attr: com.ibm.di.SSLServerProtocols

                         value: 'TLSv1.2'

 

Enabling debug logs and disabling json-logging

 

If the config.yaml file which is used as the YAML_CONFIG_FILE environment variable for the container doesn't have root-level and json-logging configuration elements, follow the instructions that are provided in https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#general_logging to the add root-level and json-logging configuration elements section to the config.yaml file.

 

Refer https://www.ibm.com/docs/api/v1/content/SSCQGF_10.0.0/container/html/verify-directory-integrator.html#general_logging page from SVDI to add root-level and json-logging configuration elements (if they don't exist in current configuration) to the config.yaml file which is used as parameter for YAML_CONFIG_FILE environment variable of the container.

To enable debug logs, set the value for root-level to debug. To disable json logging, set the value for json-logging element to false.

 

Uninstalling the adapter

Using Script

Use the below command to remove the adapter:

 

/path/to/adapterUtil.sh -removeAdapter Adapter-Thycotic

 

Manually copying / removing files to / from the Persistent Volume

Remove files from the given directory structure of the persistent volume mapped to the /opt/IBM/svgadapters directory of the container image.

Note: Some 3rd party jars and ILMT-Tags files might be common with other installed adapters, and hence should not be removed while uninstalling this adapter:

ThycoticConnector.jar

Remove this file from <Persistent_Volume>/jars/connectors directory.

 

ILMT-Tags

Remove below files from <Persistent_Volume>/swidtag directory:

 

ibm.com_IBM_Verify_Identity_Governance_Application_Adapters-10.0.2.swidtag

ibm.com_IBM_Verify_Identity_Governance_Enterprise-10.0.2.swidtag

 

3rd party jars

Remove the appropriate version of the 3rd party jar files used by this adapter as listed in the Supported Configuration > Supported third-part client libraries from the <Persistent_Volume>/jars/patches directory.

 

 

  

 

Chapter 4: Upgrading

             Upgrading the adapter binaries or connector

                          Take backup of adapter binaries or connector

                                         Procedure:

                                         Take backup of below files before performing upgrade:

                                         <SDI-HOME>/jars/connectors/ThycoticConnector.jar

 

                          Note: Stop the dispatcher service before the upgrading the connector and start it again after the upgrade is complete.

 

                            Upgrade adapter binaries or connector

                                         Procedure:

                                         Copy ThycoticConnector.jar from the adapter package to the <SDI-HOME>/jars/connectors directory.

 

             Upgrading the adapter profile

                          Read the adapter Release Notes for any specific instructions before you import a new adapter profile.

                          There is ThycoticAdapterProfile.jar included in the Thycotic Adapter distribution package.

 

                          Note: Restart the Dispatcher service after importing the profile. Restarting the Dispatcher clears the assembly lines cache and ensures that the dispatcher runs the assembly lines from the updated adapter profile. 

 

Chapter 5: Configuring

Enabling TLSv1.2 in Security Directory Integrator

Procedure:   

1. Apply recommended fix packs and limited availability (LA) versions on the Security Directory Integrator. See Recommended fixes for IBM Tivoli Directory Integrator (TDI) & IBM Security Directory Integrator (SDI).

2. After applying the appropriate updates, modify the /solution.properties file by appending the following text to the bottom of the file:

 

#####################

# # Protocols to enforce SSL protocols in a SDI Server

# # Optional values for com.ibm.di.SSL* property (TLSv1, TLSv1.1, TLSv1.2). # # This can be a multi-valued comma separated property

# # Optional values for com.ibm.jsse2.overrideDefaultProtocol property (SSL_TLSv2, TLSv1,TLSv11,TLSv12).

# # This is a single value property.

#####################

-

com.ibm.di.SSLProtocols=TLSv1,TLSv1.1,TLSv1.2

com.ibm.di.SSLServerProtocols=TLSv1,TLSv1.1,TLSv1.2

com.ibm.jsse2.overrideDefaultProtocol=TLSv1

com.ibm.jsse2.overrideDefaultTLS=true

#####################

 

             Customizing the adapter

 

                          The adapters can be customized or extended or both. The type and method of this customization varies depending on the adapter.

                          Customizing and extending adapters requires a number of skills. The developer must be familiar with the following concepts and skills:

 

                          - IBM Security Verify Governance Identity Manager administration

                          - IBM Security Verify Governance administration

                          - IBM Security Directory Integrator management

                          - Security Directory Integrator Assembly Line development

                          - LDAP schema management

                          - Working knowledge of Java™ scripting language

                          - Working knowledge of LDAP object classes and attributes

                          - Working knowledge of XML document structure

 

                          Note: If the customization requires a new Security Directory Integrator connector, the developer must also be familiar with Security Directory Integrator connector development and working knowledge of Java programming language.

 

                          Support for custom adapters

                                         The integration to IBM Security Verify Governance servers "the adapter framework" is supported. However, IBM does not support the customizations, scripts, or other modifications. If you experience a problem with a customized adapter, IBM Support may require the problem to be demonstrated on the GA version of the adapter before a PMR is opened.

 

Chapter 6: Troubleshooting

                          Enabling DEBUG Logs on SDI Server

                          Procedure:

1.     Stop the SDI Server process

 

                          Pre-7.2.0-ISS-SDI-FP0008

                          2. Edit the <SDI_Solution_Directory>/etc/log4j.properties

                          3. Modify the following line:

                                      log4j.rootCategory=INFO, Default

                                      to

                                      log4j.rootCategory=DEBUG, Default

 

                          Post-7.2.0-ISS-SDI-FP0008

                          2. Edit the <SDI_HOME_Directory>/etc/log4j2.xml

                          3. Modify the following line:

                                      <Root level="info">

                                     to

                                      <Root level="debug">

 

                          From-7.2.0-ISS-SDI-FP0011

                          4. To enable TCB block in debug

                          5. Append the line com.ibm.di.logging.close=false in the  <SDI_HOME_Directory>/etc/global.properties file.

                          

                          6. Start the SDI Server process

                          7. Re-create the problem and collect the <SDI_Solution_Dir>/logs/ibmdi.log

 

 

                          Logs are not getting printed in FP13 in Windows OS:

                         To fix this issue copy log4j2.xml file from <SDI_Home_Dir>/etc and add to the <SDI_Solution_Dir>/etc (which was missing there). Then configure <SDI_Solution_Dir>/ibmdiservice.props with

                          jvmcmdoptions=-Dlog4j2.configurationFile=etc\log4j2.xml

 

 

Chapter 7: Reference

             No updates for the current release 

 

Supported Configurations

       Supported third-party client libraries:

·      json-simple-1.1.1.jar

·      commons-logging-1.2

·      httpclient-4.5.14

·      httpcore-4.4.16

·      commons-codec-1.11

 

        The IBM Security Verify Governance Adapter for Thycotic Workspace was built and tested on the following product versions.

       Adapter Installation Platform: 

 

         Due to continuous Java security updates that may be applied to your IBM Security Verify Governance server and IBM Security Verify Governance Identity Manager server, the following SDI releases are the officially supported versions:

              -  Security Directory Integrator 7.2 + FP13 and 7.2 + FP14 (FP14 supports Linux OS only).

              -  Security Verify Directory Integrator 10.0.0 + FP02

      Note:  Earlier versions of SDI that are still supported may function properly, however to resolve any communication errors, you must upgrade your SDI releases to the officially supported versions by the adapters. Please refer to the adapter's installation and configuration guides for the latest update on IBM Security Directory Integrator versions and fix packs

       

       Managed Resource:

      

      IBM Secret Server 10.5

      IBM Security Privilege Vault Cloud

 

      IBM Verify Identity Governance v11.0

      IBM Security Verify Governance Identity Manager v10.0*

      IBM Security Verify Governance v10.0

     * Unless this document specifies a specific fix pack version of ISVG Identity Manager v10, we expect the adapter to work with ISIM 6 as well. However, it will only be debugged and fixed from the perspective of ISVG-IM v10.

 

Notices

This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:

 

IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY  10504-1785  U.S.A.

 

For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:

 

Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
1623-14, Shimotsuruma, Yamato-shi
Kanagawa 242-8502 Japan

 

This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.

Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.

IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged should contact:

IBM Corporation
2ZA4/101
11400 Burnet Road
Austin, TX 78758  U.S.A.

 

Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.

The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us.

Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

Trademarks

IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at 
www.ibm.com/legal/copytrade.shtml.

Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.